MGASA-2024-0009

Source
https://advisories.mageia.org/MGASA-2024-0009.html
Import Source
https://advisories.mageia.org/MGASA-2024-0009.json
JSON Data
https://api.test.osv.dev/v1/vulns/MGASA-2024-0009
Related
Published
2024-01-14T22:23:43Z
Modified
2024-01-14T22:03:34Z
Summary
Updated x11-server and tigervnc packages fix security vulnerabilities
Details

The updated packages fix security vulnerabilities: A flaw was found in xorg-server. Querying or changing XKB button actions such as moving from a touchpad to a mouse can result in out-of-bounds memory reads and writes. This may allow local privilege escalation or possible remote code execution in cases where X11 forwarding is involved. (CVE-2023-6377) A flaw was found in xorg-server. A specially crafted request to RRChangeProviderProperty or RRChangeOutputProperty can trigger an integer overflow which may lead to a disclosure of sensitive information. (CVE-2023-6478)

References
Credits

Affected packages

Mageia:9 / x11-server

Package

Name
x11-server
Purl
pkg:rpm/mageia/x11-server?distro=mageia-9

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
21.1.8-7.2.mga9

Ecosystem specific

{
    "section": "core"
}

Mageia:9 / x11-server-xwayland

Package

Name
x11-server-xwayland
Purl
pkg:rpm/mageia/x11-server-xwayland?distro=mageia-9

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
22.1.9-1.2.mga9

Ecosystem specific

{
    "section": "core"
}

Mageia:9 / tigervnc

Package

Name
tigervnc
Purl
pkg:rpm/mageia/tigervnc?distro=mageia-9

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.13.1-2.2.mga9

Ecosystem specific

{
    "section": "core"
}